Movatterモバイル変換


[0]ホーム

URL:


US10523670B2 - Devices, systems, and methods for security using magnetic field based identification - Google Patents

Devices, systems, and methods for security using magnetic field based identification
Download PDF

Info

Publication number
US10523670B2
US10523670B2US15/707,019US201715707019AUS10523670B2US 10523670 B2US10523670 B2US 10523670B2US 201715707019 AUS201715707019 AUS 201715707019AUS 10523670 B2US10523670 B2US 10523670B2
Authority
US
United States
Prior art keywords
user
communication device
electromagnetic
different
electromagnetic signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US15/707,019
Other versions
US20180007044A1 (en
Inventor
Alexander Varshavsky
Kevin Ansia Li
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Intellectual Property I LP
Original Assignee
AT&T Intellectual Property I LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AT&T Intellectual Property I LPfiledCriticalAT&T Intellectual Property I LP
Priority to US15/707,019priorityCriticalpatent/US10523670B2/en
Assigned to AT&T INTELLECTUAL PROPERTY I, L.P.reassignmentAT&T INTELLECTUAL PROPERTY I, L.P.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: LI, KEVIN ANSIA, VARSHAVSKY, ALEXANDER
Publication of US20180007044A1publicationCriticalpatent/US20180007044A1/en
Application grantedgrantedCritical
Publication of US10523670B2publicationCriticalpatent/US10523670B2/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location.

Description

CROSS-REFERENCE TO RELATED APPLICATION
This application is a continuation of U.S. patent application Ser. No. 14/948,567, filed Nov. 23, 2015, now U.S. Pat. No. 9,769,165, which is incorporated herein by reference in its entirety and which is a continuation of U.S. patent application Ser. No. 14/299,400, filed Jun. 9, 2014, now U.S. Pat. No. 9,197,636, which is incorporated herein by reference in its entirety and which is a continuation of U.S. patent application Ser. No. 13/180,805, filed Jul. 12, 2011, now U.S. Pat. No. 8,752,200, which is incorporated herein by reference in its entirety.
BACKGROUND OF THE SUBJECT DISCLOSUREField of the Subject Disclosure
The present subject disclosure relates to authentication. More specifically, the present subject disclosure relates to using a magnetometer for authentication based upon an electromagnetic signature.
Background of the Subject Disclosure
Communication devices, such as cellular telephones, have become a common tool of everyday life. Cellular telephones are no longer simply used to place telephone calls. With the number of features available rapidly increasing, cellular telephones, often in the form of a smartphone, are now used for storing addresses, keeping a calendar, reading e-mails, drafting documents, etc. In many instances, these features require a secure environment. Thus, with this wide range of features comes an even greater need for security. For instance, e-mails or documents may be private or privileged and need to be safeguarded from unauthorized users. An unauthorized user picking up or stealing the communication device should not be able to access this private information. In many instances, the operation of the communication device should be limited to certain areas.
As more enterprises turn towards smartphones, the ability to lock or otherwise limit phones is a necessity. Currently, smartphones may be password protected through the keypad. However, users of smartphones find password locks on smartphones annoying and inconvenient. The user sets up a password consisting of a series of keystrokes which must be re-entered to later access the cellular phone. These passwords can generally be any number of characters which the user will remember. Ideally, the password is challenging enough that an unauthorized user cannot simply guess the password and gain access. A problem with using simply a keypad for password entry is the ability of others to determine the password without the user's knowledge. Someone may be able to see the user enter the password and easily be able to repeat it. Additionally, these passwords are inconvenient, as users must look directly at the keypad and press a sequence of buttons. The keys are often small with hard to read numbers or letters, and lockouts may require frequent use of the passwords. Thus, users often choose to disable such features. More of these users may choose to utilize the security mechanisms if such mechanisms were easier and more convenient.
In addition to smartphones, many other devices or systems may also benefit from using authentication. Secure facilities, safes, automobiles, networks and many others may all benefit from ensuring that only the correct user has access. Unfortunately, many forms of authentication are currently too easy to fake.
Today, devices used to capture gestures may utilize accelerometers or may capture an infrared or visual representation of the gestures. These devices can generally detect a motion being made by a user. However, these methods of capture cannot detect a particular user making them and may be copied by an unauthorized user.
What is needed is a way to authenticate a device or user using the electromagnetic spectrum. Such authentication should ensure that access is only granted to a correct user or when in a correct location.
SUMMARY OF THE SUBJECT DISCLOSURE
The present subject disclosure addresses the above-identified issues by determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. If a mismatch occurs, i.e., if the electromagnetic signature does not match an authorized electromagnetic signature, then a plurality of remedial actions may be performed, including wiping a memory of the device. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location.
In one exemplary embodiment, the present subject disclosure is a device for authentication. The device includes a processor, a magnetometer in communication with the processor, and a memory in communication with the processor. The memory contains a security logic for detecting a detected electromagnetic signature, determining that the detected electromagnetic signature matches at least one of a plurality of authorized electromagnetic signatures, and granting authentication.
In another exemplary embodiment, the present subject disclosure is a system for authentication. The system includes a plurality of magnets creating an electromagnetic signature and a device having an integrated magnetometer. The magnetometer detects the electromagnetic signature and the device has a memory containing a plurality of authorized electromagnetic signatures. Authorization is granted when the electromagnetic signature matches an authorized electromagnetic signature from among the plurality of authorized electromagnetic signatures.
In yet another exemplary embodiment, the present subject disclosure is a method for authentication. The method includes placing a device in a magnetic field, the device having a magnetometer, detecting an electromagnetic signature, determining one of a match and a mismatch between the detected electromagnetic signature and the at least one of a plurality of authorized electromagnetic signatures, and granting authentication when a match is determined.
BRIEF DESCRIPTION OF THE DRAWINGS
FIGS. 1A and 1B show a communication device for detecting an electromagnetic signature, according to an exemplary embodiment of the present subject disclosure.
FIG. 2 shows a communication device placed in an environment, according to an exemplary embodiment of the present subject disclosure.
FIG. 3 shows a system for authentication utilizing magnetic fields, according to an exemplary embodiment of the present subject disclosure.
FIG. 4 shows a method of authenticating an environment for a device, according to an exemplary embodiment of the present subject disclosure.
FIG. 5 shows a learning mode for a communication device, according to an exemplary embodiment of the present subject disclosure.
FIG. 6 shows a system for gesture based authentication, according to an exemplary embodiment of the present subject disclosure.
FIG. 7 shows a method of using a device to capture a gesture based authentication, according to an exemplary embodiment of the present subject disclosure.
FIG. 8 shows a method of creating an electromagnetic field for authentication, according to an exemplary embodiment of the present subject disclosure.
FIG. 9 shows a method of creating a variable electromagnetic field for authentication, according to an exemplary embodiment of the present subject disclosure.
FIG. 10 shows a method of a learning mode for a gesture based authentication, according to an exemplary embodiment of the present subject disclosure.
FIG. 11 shows a system for gesture based authentication, according to an exemplary embodiment of the present subject disclosure.
FIG. 12 shows a method for reading an electromagnetic signature from a device, according to an exemplary embodiment of the present subject disclosure.
FIG. 13 shows a biometric based authentication, according to an exemplary embodiment of the present subject disclosure.
FIG. 14 shows a biometric based authentication, according to an exemplary embodiment of the present subject disclosure.
FIG. 15 shows a method of biometric authentication, according to an exemplary embodiment of the present subject disclosure.
FIG. 16 shows a screenshot of settings for electromagnetic authentication, according to an exemplary embodiment of the present subject disclosure.
DETAILED DESCRIPTION OF THE SUBJECT DISCLOSURE
The following detailed description discloses devices, systems, and methods for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location.
In exemplary embodiments of the subject disclosure, the magnetometer is used to unlock building electronic access control systems, unlock and start automobiles, open a safe, etc. In alternative embodiments, systems being accessed require a secondary form of authentication in order to process a user requested function such as door entry or automobile ignition. This secondary form of authentication may be a password, a biometric, a keycard, etc.
“Communication device” or “device”, as used herein and throughout this disclosure, refers to any electronic device capable of sending or receiving data, and may utilize either a wired or wireless format. Many communication devices store data as well. A communication device may have a processor, a memory, a transceiver, an input, and an output. Examples of such devices include cellular telephones, personal digital assistants (PDAs), computers such as portable computers, etc. A communication device also includes smart cards, such as contactless integrated circuit cards (CICC). The memory stores applications, software, or logic. Examples of processors are computer processors (processing units), microprocessors, digital signal processors, controllers and microcontrollers, etc. Examples of device memories that may comprise logic include RAM (random access memory), flash memories, ROMS (read-only memories), EPROMS (erasable programmable read-only memories), and EEPROMS (electrically erasable programmable read-only memories).
“Logic” as used herein and throughout this disclosure, refers to any information having the form of instruction signals and/or data that may be applied to direct the operation of a processor. Logic may be formed from signals stored in a device memory. Software is one example of such logic. Logic may also be comprised by digital and/or analog hardware circuits, for example, hardware circuits comprising logical AND, OR, XOR, NAND, NOR, and other logical operations. Logic may be formed from combinations of software and hardware. On a network, logic may be programmed on a server, or a complex of servers. A particular logic unit is not limited to a single logical location on the network.
Communication devices may communicate with each other and with other elements via a network, for instance, a wireless network, or a wireline network. A “network” can include broadband wide-area networks, local-area networks, and personal area networks. Communication across a network is preferably packet-based; however, radio and frequency/amplitude modulations networks can enable communication between communication devices using appropriate analog-digital-analog converters and other elements. Examples of radio networks include WiFi and BLUETOOTH® networks, with communication being enabled by hardware elements called “transceivers.” Communication devices may have more than one transceiver, capable of communicating over different networks. For example, a cellular telephone can include a GPRS transceiver for communicating with a cellular base station, a WiFi transceiver for communicating with a WiFi network, and a BLUETOOTH® transceiver for communicating with a BLUETOOTH® device. A network typically includes a plurality of elements that host logic for performing tasks on the network.
In modern packet-based wide-area networks, servers may be placed at several logical points on the network. Servers may further be in communication with databases and can enable communication devices to access the contents of a database. An authentication server is an example of such a server. An authentication server can include several network elements, including other servers, and may be part of a network, for example, a cellular network.
For the following description, it can be assumed that most correspondingly labeled structures across the figures (e.g.,100 and200, etc.) possess the same characteristics and are subject to the same structure and function. If there is a difference between correspondingly labeled elements that is not pointed out, and this difference results in a non-corresponding structure or function of an element for a particular embodiment, then that conflicting description given for that particular embodiment shall govern.
In many embodiments of the present subject disclosure, a communication device is used to capture an electromagnetic signature. This electromagnetic signature may be of an environment, a gesture around a magnetic source, etc. The communication device may either authenticate the electromagnetic signature itself, or the authentication may be accomplished remotely, such as by an authentication server. When the electromagnetic signature is authenticated by the device, the electromagnetic signature is compared with a plurality of authorized electromagnetic signatures. These authorized electromagnetic signatures may be programmed into the device in a learning mode, sent to the device by the authentication server, programmed into the device by a second device, etc.
FIGS. 1A and 1B show acommunication device100 for detecting an electromagnetic signature, according to an exemplary embodiment of the present subject disclosure. In this embodiment,communication device100 is a smartphone.Communication device100 includes amagnetometer104, which is capable of measuring a magnetic field to capture an electromagnetic signature. In exemplary embodiments of the present subject disclosure, whencommunication device100 is in an authorized environment,communication device100 is in an unlocked state, such that it may be operated by a user.Communication device100 determines that it is located in an authorized environment by capturing an electromagnetic signature of the environment and comparing this captured electromagnetic signature with an authorized signature stored oncommunication device100 or on a remote device or server in communication withcommunication device100.Communication device100 may also authenticate a user by capturing an electromagnetic signature of a nearby magnetic source as the user makes a gesture with the device. These and other uses are possible forcommunication device100.
FIG. 1A shows the external components ofcommunication device100.Communication device100 includes adisplay101, akeypad102, and amicrophone103.Display101 may be a liquid crystal display (LCD), a light emitting diode display (LED), a touchscreen display, etc., and provides an output for applications stored on amemory107 and executed by a central processing unit (CPU)109 ofcommunication device100.Keypad102 provides for an input forcommunication device100.Keypad102 may contain alphanumeric keys, shortcut keys, hotkeys, etc.Microphone103 provides a further input forcommunication device100.Microphone103 may be used for voice calls, commands, recording, etc. An antenna (not shown) provides a means for sending and receiving signals fromtransceiver106 to other devices or networks.
FIG. 1B shows the internal components ofcommunication device100. The internal components include amagnetometer104,CPU109,memory107 storing adevice logic108, abattery105 or other power supply, and atransceiver106.CPU109 controls the components ofcommunication device100 by executingdevice logic108 frommemory107.Memory107stores device logic108 as well as other data forcommunication device100.Device logic108 includes a security logic or application forcommunication device100. In exemplary embodiments of the present subject disclosure, the security logic provides for authenticating a user or location forcommunication device100. The security logic instructsmagnetometer104 to measure the strength and/or direction of a magnetic field.Magnetometer104 may be a scalar magnetometer to measure the total strength of a magnetic field to which it is subjected, or a vector magnetometer which has the capability to measure the component of the magnetic field in a particular direction, relative to the spatial orientation of the device. The use of three orthogonal vector magnetometers allows the magnetic field strength, inclination, and declination to be uniquely defined. The features ofmagnetometer104 may vary by embodiment and may depend upon the type of authentication to be performed. If the electromagnetic signature detected matches an authorized signature withinmemory107, then the security application allows access tocommunication device100 and/or applications onmemory107 ofcommunication device100. If a mismatch is detected, i.e. if the electromagnetic signature does not match any authorized signature frommemory107, then the security application lockscommunication device100 and/or applications oncommunication device100.
The security application onlogic108 can lock certain applications, specific features, or access tocommunication device100 completely in the case of a mismatch. For instance, when the detected electromagnetic signature does not match an authorized electromagnetic signature frommemory107,logic108 can lock a cellular transceiver oncommunication device100, thereby renderingcommunication device100 unable to connect to a cellular network. Alternatively,logic108 can lockkeypad102 ordisplay101, thereby renderingcommunication device100 unusable. Specific folders or files, or sensitive data stored onmemory107 can be locked as well. Other combinations will be apparent to one of ordinary skill in the art in light of this disclosure.
In embodiments of the present subject disclosure, the communication device contains several personas for a user. For instance, the communication device may have a “work” persona containing work contacts, applications used for work, files used for work, etc. The communication device may further have a “personal” persona containing contacts of family and friends, games, personal applications, etc. The communication device may be programmed such that when an electromagnetic signature of the work environment is detected, the work persona becomes active. Similarly, when the electromagnetic signature of the user's home is detected, the personal persona may be activated. Alternatively, the personal persona may become active any time the electromagnetic signature of the work environment is not detected.
While this embodiment shows the communication device as a smartphone, other devices may be similarly equipped with a magnetometer in order to provide authentication. One of ordinary skill in the art would recognize other examples of devices that would benefit from the features of the present subject disclosure. Therefore, this embodiment should not be viewed as limiting the scope of the subject disclosure.
Embodiments of the subject disclosure enable the use of a device to be constrained to a particular area. For example, a corporation may desire that employees only use a particular device in their office. Alternatively, the corporation may only want certain functions of a device, such as a laptop, to work when not in a secure location. For instance, general functions may work anywhere, but access to company files, email, etc., may be limited to within an office of the corporation. To do this, the device may be programmed to only allow access when a detected electromagnetic signal of the location of the device matches a stored authorized electromagnetic signature in the device. There may be a series of authorized electromagnetic signatures for different locations within the office.
Exemplary embodiments of the present subject disclosure further contain an input, such as a biometric scanner, within the communication device. The input provides for further authentication based upon the identity of the user or an entry. For example, an authorized electromagnetic signature may unlock the device itself while a biometric scan may further be necessary to unlock features or an application on the device. Other embodiments use inputs common to communication devices, such as a keypad to input a password, or a camera to scan a key card.
Utilizing a magnetometer in a device may provide for savings in energy consumption by the device. For example, by not requiring near field communications for embodiments of the subject disclosure, the device saves energy that would otherwise be used with these power-consuming features.
FIG. 2 shows acommunication device200 placed in an environment, according to an exemplary embodiment of the present subject disclosure. In this embodiment, the system includes adevice200 including a magnetometer which is located within aroom216.Permanent magnets210,211, and212 may be placed intoroom216 to alter the electromagnetic signature ofroom216. The placement ofpermanent magnets210,211, and212 creates a unique electromagnetic signature.Device200 may be programmed such that this unique electromagnetic signature is required to accessdevice200 including programs, network access, use personas, etc. For instance,device200 may sense the electromagnetic signature of its environment. Whendevice200 is located outside of an authorized environment, such asroom216,device200 locks such that it may not be used. Whendevice200 is brought intoroom216, and the magnetometer senses the correct electromagnetic signature,device200 unlocks and may be used.Device200 may then re-authenticate on a periodic basis to ensure thatdevice200 remains inroom216.
Permanent magnets are used in this exemplary embodiment. However, other exemplary embodiments use electromagnets driven by a server. By using electromagnets, the intensity of the magnetic field can be changed. An arrangement of electromagnets may be useful for individual offices in a building. When two people switch offices, the current through the electromagnets in their respective offices are simply swapped. Further embodiments constantly vary the current to at least one of the electromagnets to create a dynamic electromagnetic signature. Sensing a dynamic electromagnetic signature requires sensing at more than one time. In some of these embodiments, the electromagnetic signature is taken twice. Using the difference in time between takes, the whole dynamic signature is calculated and submitted to the authentication server. Dynamic signatures can be simple, such as a linear variation of a single electromagnet, or complex, such as non-linear variation of multiple electromagnets. Complexity may be limited by available bandwidth and processing power.
The authorized environment may need to be programmed into the device. This can be accomplished by placing the device in the authorized environment while the device is in a learning mode. The device detects the electromagnetic signature and stores the signature in a database on the memory of the device. Alternatively, this database is stored on a network in communication with the device. Devices that lock completely make exceptions for communicating with a network database of signatures. Multiple authorized electromagnetic signatures may be stored on the database, each with access to the same features or a different set of features. The learning mode may be activated by a network, by a code entered into the device, by another device, etc.
In embodiments of the subject disclosure, a different persona on the device activates upon the detected electromagnetic signature of the environment. For instance, when the device is a smartphone, the smartphone may have different personas for different locations. When the smartphone is at the user's work, a magnetometer in the smartphone detects the electromagnetic signature of the user's office. This is compared with a stored signature for the office. Because the signature matches, the smartphone switches to the work persona. This may allow the user to access different files, contacts, applications, etc., and may limit or expand functions of the smartphone. For instance, when in the work persona, the smartphone may prevent the user from sending any files or may require a secure network connection.
In an exemplary embodiment of the subject disclosure, a business application on a communication device may only be used in a certain location. A business application which grants access to a virtual private network is limited to devices in the office building at this certain location, while other applications, such as a notepad, may be used at any location. Thus, a notepad application on a laptop can be accessed by a user from home while the laptop is at home. However, if the user tries to access the business application, the business application will not open because the electromagnetic signature at home does not match the stored authorized electromagnetic signature for the office building. When at the office building with the laptop, the magnetometer detects the electromagnetic signature of a specific office within the office building and the user is allowed to access the business application. Logic on the laptop may constantly monitor whether the electromagnetic signature detected remains an authorized electromagnetic signature. Thus, if the user is accessing the business application while leaving the building with the laptop, the business application locks when the user leaves the building, as an authorized electromagnetic signature is no longer detected, resulting in a mismatch.
In many embodiments, authorization is performed periodically. A countdown timer sequence, based upon user-defined settings in the communication device logic, begins after an authorization, and ends just before another authorization. Once the timer expires, the device may change to an inactive and locked state that triggers a locked state. The device may be changed back into an unlocked state by authenticating the environment/user/gesture again. This feature provides the user with safeguards against the device remaining in an unlocked and user interface accessible state if the user loses control of the device or the device leaves a secure environment.
Other security functions may be triggered so that data on the communication device is properly secured when the device is outside of the secure environment for a period of time. These security functions may include, but are not limited to memory wipes, biometric locks, etc. Therefore, for example, if the device is stolen and taken out of the environment, then data that should not leave a secure environment may be erased and not used by an unauthorized user. The memory need not be wiped completely in every application. For some applications, only a portion of the memory may need purging. Additionally or alternatively, the device may further require a biometric or other secondary authentication to unlock.
FIG. 3 shows a system for authentication utilizing magnetic fields, according to an exemplary embodiment of the present subject disclosure. In this embodiment, a series ofelectromagnets313,314, and315 are in communication with anauthentication server320.Electromagnets313,314, and315 may be a wire wound into a coil, such as a solenoid, a toroid, etc. A stronger electromagnet may be formed by placing a ferromagnetic material, such as soft iron, inside the coil.Authentication server320 creates a magnetic field by sending an electric current through one or more ofelectromagnets313,314, and315. Manipulating the current throughelectromagnets313,314, and315 changes the magnetic field.Authentication server320 sends the current to each ofelectromagnets313,314, and315 to create a unique electromagnetic signature in an environment, such as aroom316. This electromagnetic signature may be varied by changing the current applied toelectromagnets313,314, and315. Adevice300, such as a cellular telephone, may be withinroom316.Device300 includes a magnetometer which detects the electromagnetic signature ofroom316.Device300 compares the electromagnetic signature with a plurality of stored electromagnetic signatures located on a memory ofdevice300. If the electromagnetic signature matches a stored electromagnetic signature,device300 may become unlocked or otherwise operate according to settings on the memory for the stored electromagnetic signature. According to an embodiment of the subject disclosure,authentication server320 may change the electromagnetic signature, for example, according to the time of day. A database on the memory ofdevice300 may include the plurality of stored electromagnetic signatures hashed according to the time. The hash may be a global hash, based upon a global clock, may utilize RSA for public-key cryptography, etc.
In embodiments of the subject disclosure, thedevice300 is also in communication with theauthentication server320. This communication may occur over near field communication, WiFi, a cellular network, a wired connection, etc. In these embodiments, theauthentication server320 may update thedevice300 with the authorized electromagnetic signatures with which to match. These authorized electromagnetic signatures may change according to a time of day, a day of the week, a position of the device, etc. If thedevice300 detects a variation when learning dynamic electromagnetic signatures, the device assumes a dynamic electromagnetic signature, and records as such.
FIG. 4 shows a method of authenticating an environment for a device, according to an exemplary embodiment of the present subject disclosure. Certain features of the device have been locked and may only be unlocked when the device is in an authorized environment. For instance, the feature may be all applications on the device, specific applications on the device, a connection to a network, a persona of the device, etc. In this embodiment, the device is equipped with a magnetometer such that it may detect and capture electromagnetic signatures. The device has either previously captured the electromagnetic signature of an authorized environment and saved the electromagnetic signature for comparison, or the device may receive a transmission detailing the electromagnetic signature of the authorized environment. The method begins when the device is placed in the environment S430. Alternatively, the device may already be located in the environment and the authentication ensures that the device is still in the environment. The device detects and captures an electromagnetic signature of the environment using the magnetometer S431. If the device does not already have the electromagnetic signatures of stored environments stored on the device, the device may receive a transmission detailing the authorized electromagnetic signatures and stores the authorized electromagnetic signatures S432. The detected electromagnetic signature is then compared with the authorized electromagnetic signatures S433. This may utilize a hash function in order to accelerate the lookup time when many different variations of electromagnetic signatures are authorized. The device determines whether the detected electromagnetic signature matches any of the stored authorized electromagnetic signatures S434. If there is a match, then at least one feature of the device is unlocked S435. If there is a mismatch, the features of the device that have been locked remain locked S436 and the device attempts to capture a new electromagnetic signature S431.
In embodiments of the subject disclosure, the logic may control the magnetometer to constantly or periodically monitor for the electromagnetic signature of an authorized environment while the application or feature is unlocked. The logic determines whether the device remains within an authorized environment. If the device remains in an authorized environment, then the application or feature remains unlocked. If the device leaves an authorized environment, then the application or feature is locked.
FIG. 5 shows a learning mode for a communication device, according to an exemplary embodiment of the present subject disclosure. The learning mode is used to set an authorized environment in which certain features of the device are allowed. This is accomplished by capturing an electromagnetic signature of the environment which is authorized in order to make a later comparison. In this embodiment, the method begins by placing the device in the learning mode S540. This may be accomplished by pressing a button, entering a password, entering a biometric of an authorized user, etc. With the device in the learning mode, the user specifies a selected feature of the device that will be allowed for the subsequently set environment S541. For instance, the user may specify that work e-mail may be accessed on the device in the authorized environment. The device is then placed in the authorized environment S542. The device captures the electromagnetic signature of the environment using a magnetometer onboard the device S543. The device then saves this electromagnetic signature and associates the electromagnetic signature with the selected feature S544. The learning process is then ended S545. For instance, the learning process may be ended by pressing a button, entering a password, a biometric, etc. or may end when the association between the electromagnetic signature and the selected feature is made. With the association made, the selected feature is accessible when the device later detects the electromagnetic signature of the authorized environment.
FIG. 6 shows a system for gesture based authentication, according to an exemplary embodiment of the present subject disclosure. In this embodiment, acommunication device600 reads an electromagnetic signature ascommunication device600 is gestured around amagnetic source624. Alternatively,communication device600 may simply be placed in front ofmagnetic source624. The system includescommunication device600, anaccessible unit622,magnetic source624, and anauthentication server620.Communication device600 includes a magnetometer to detect and capture an electromagnetic signature produced bymagnetic source624.Communication device600 also contains a memory and processor to execute logic on the memory.Communication device600 may further be gestured to create a unique electromagnetic signature. For instance,positioning communication device600 at a certain distance frommagnetic source624 and gesturingcommunication device600 in a circle produces a different electromagnetic signature read by the magnetometer than gesturingcommunication device600 in a square.Magnetic source624 may be a permanent magnet, may be an electromagnet driven byauthentication server620, etc.Accessible unit622 may be any door, barrier, etc. that prevents access without proper authentication. For instance,accessible unit622 may be a safe, a secure facility, a vehicle, etc.Authentication server620 is capable of communicating withcommunication device600.Authentication server620 includes a memory containing a security logic and a processor.Authentication server620 also communicates withaccessible unit622 to openaccessible unit622 whencommunication device600 is authenticated. Authentication may be performed by eithercommunication device600 orauthentication server620. Whenauthentication server620 authenticates,communication device600 detects an electromagnetic signature and sends the electromagnetic signature toauthentication server620.Authentication server620 attempts to match the electromagnetic signature with authorized electromagnetic signatures saved within the memory ofauthentication server620. This may require using a hash function to find the match. Whenauthentication server620 is driving an electromagnet, multiple variables may be needed in determining a match. If a match is found,authentication server620 sends a signal toaccessible unit622 to grant access. If a match is not found, access is not granted. Whencommunication device600 authenticates,communication device600 detects the electromagnetic signature and attempts to match the electromagnetic signature with an authorized electromagnetic signature stored within the memory ofcommunication device600. If a match is found,communication device600 sends a signal toauthentication server620 which in turn signalsaccessible unit622 to grant access. If a match is not found, access is not granted.Communication device600 may prompt the user to attempt authentication again.
FIG. 7 shows a method of using a device to capture a gesture based authentication, according to an exemplary embodiment of the present subject disclosure. In this embodiment, the device is being used as authentication to open or otherwise provide access to an accessible unit. This accessible unit may be a door, a second device, a network, etc. Gestures around a magnetic source are used to produce a unique electromagnetic signature which is detected by the device. The method begins when the magnetometer of the device begins scanning S747. The device may start automatically, when the device receives a communication from the accessible unit, when a proximity to the accessible unit is detected, when a location is detected, when a button is pressed, when a password is entered, when a biometric is read, etc. The device is then gestured around the magnetic source S748. As the device is gestured, the magnetometer of the device detects an electromagnetic signature S749. The device then sends the detected electromagnetic signature to the accessible unit S750. If the detected electromagnetic signature matches a stored authorized electromagnetic signature indicating a correct electromagnetic signature for access, access to the accessible unit is granted. The device may receive an affirmation of the correct electromagnetic signature S751.
Such a gesture-based authentication using a magnetometer is more secure than simply using an accelerometer. Using the electromagnetic signature allows for authentication to be double keyed. According to embodiments of the subject disclosure, both the device and the gesture must be correct for authentication. For example, drawing a circle while facing the magnetic source would produce a different electromagnetic signature than when drawing the circle while facing a different direction. When using an accelerometer, these measurements are the same. Further, a different gesture and/or orientation may be used for each day, providing more possibilities.
FIG. 8 shows a method of creating an electromagnetic field for authentication, according to an exemplary embodiment of the present subject disclosure. In this embodiment, an accessible unit contains or is in proximity to a permanent magnet. The accessible unit contains or is in communication with a processor and memory which stores at least one authorized electromagnetic signature for entry, etc. In embodiments of the subject disclosure, the accessible unit has a transceiver to communicate with the device. The device may be further gestured around the magnetic source to create a unique detected electromagnetic signature. The method begins with the accessible unit sending a signal to the device S853. The signal may be a message instructing the device to begin authentication, may contain instructions for authentication, etc. After the device captures an electromagnetic signature, the accessible unit receives a transmission from the device containing the electromagnetic signature S854. The accessible unit or the authentication server compares the received electromagnetic signature with a plurality of authorized electromagnetic signatures S855. The accessible unit or authentication server then determines whether or not the received electromagnetic signature matches any of the authorized electromagnetic signatures S856. If a match is found, the accessible unit grants access S857. If a mismatch is found, the accessible unit does not grant access S858 and the method returns to sending a signal to the device S853.
FIG. 9 shows a method of creating a variable electromagnetic field for authentication, according to an exemplary embodiment of the present subject disclosure. In this embodiment, an accessible unit sends a current through an electromagnet which a magnetometer of a device detects. The accessible unit contains or is in communication with a processor and memory which stores at least one authorized electromagnetic signature for entry, logic for comparison of electromagnetic signatures, etc. The device is further gestured to create a unique detected electromagnetic signature. The method begins when the accessible unit sends a current through the electromagnet, creating a magnetic field S968. After the magnetometer of the device captures an electromagnetic signature, the accessible unit receives a transmission from the device containing the electromagnetic signature S969. Using the logic and processor, the accessible unit compares the received electromagnetic signature with an authorized electromagnetic signature S970. The accessible unit then determines whether or not the received electromagnetic signature matches the authorized electromagnetic signature S971. If the two match, the accessible unit grants access S972. If the two do not match, the accessible unit determines a mismatch, denies access S973 and the method returns to sending the current through the electromagnet S968.
As with previous embodiments, in embodiments of the subject disclosure, a failed authentication may lock the entire device, while in other embodiments other applications on the device may still be used. When the entire device is locked, a secondary authentication may further be required. In embodiments of the subject disclosure, after a set number of failed authentications a memory of the device may be wiped clean.
FIG. 10 shows a method of a learning mode for a gesture based authentication, according to an exemplary embodiment of the present subject disclosure. In this embodiment, a device with an onboard magnetometer captures an electromagnetic signature as the device is gestured around a magnetic source. The method begins by placing the device in a learning mode S1075. This may be accomplished by pressing a button, entering a password, entering a biometric, etc. With the device in learning mode, a function is specified S1076. The function is an application, network, persona, etc. that the authentication allows access to. The device then delivers a prompt to begin an authentication gesture S1077. The device is then gestured. The magnetometer of the device captures the electromagnetic signature created by the gesturing of the device around the magnetic source S1079. The device then delivers a second prompt to repeat the gesture S1080. As the device is again gestured, the magnetometer again captures the electromagnetic signature created S1082. The device then determines whether the electromagnetic signature of the first gesture matches that of the second gesture S1083. If the electromagnetic signatures do not match, then the device delivers a prompt to gesture the device again S1077. If the electromagnetic signatures do match, then the device determines whether an allowance is to be set S1084. This allowance is a threshold for slight variations in the sensing of the electromagnetic signature within which the device is authorized. If an allowance is necessary, or desired, then the allowance is set S1085 and the authorized electromagnetic signature, or series of signatures, is programmed into the device S1086, and associated with the specified function. If an allowance is not necessary or desired, then the authorized electromagnetic signature is programmed into thedevice1086, associated with the specified function.
FIG. 11 shows a system for gesture based authentication, according to an exemplary embodiment of the present subject disclosure. In this embodiment, amagnetometer1126 in communication with anaccessible unit1122 reads the electromagnetic signature of a gesture by acommunication device1100. The system includescommunication device1100,accessible unit1122,magnetometer1126, and anauthentication server1120.Communication device1100 has a unique electromagnetic signature that may be captured bymagnetometer1126.Communication device1100 may further be gestured to create an even more unique electromagnetic signature. For instance,positioning communication device1100 at a certain distance frommagnetometer1126 and gesturingcommunication device1100 in a circle produces a different electromagnetic signature read bymagnetometer1126 than gesturingcommunication device1100 in a square. Thus, the correct key,communication device1100, and the correct gesture are required, providing a double authentication.Accessible unit1122 may be any door, barrier, server, etc. that prevents access without proper authentication.Authentication server1120 includes a memory containing a security logic and a processor.Authentication server1120 also communicates withaccessible unit1122 to open accessible unit whencommunication device1100 is authenticated. Authentication is performed byauthentication server1120 based upon information received frommagnetometer1126.Authentication server1120 attempts to match the captured electromagnetic signature with authorized electromagnetic signatures saved within the memory ofauthentication server1120 or a database in communication withauthentication server1120. This may require using a hash function to find the match. If a match is found,authentication server1120 sends a signal toaccessible unit1122 to grant access. If a match is not found, access is not granted. Additionally,authentication server1120 may be in communication withcommunication device1100 andprompt communication device1100 to attempt authentication again.
While a communication device is used for authentication in this embodiment, other embodiments may use any kind of key with a unique electromagnetic signature. For example, any device containing an electronic component produces an electromagnetic signature which may be measured.
FIG. 12 shows a method for reading an electromagnetic signature from a device, according to an exemplary embodiment of the present subject disclosure. In this embodiment, an accessible unit includes a magnetometer that reads the electromagnetic signature of a device used for authentication. The accessible unit contains or is in communication with a memory and processor. The memory contains logic for making comparisons between electromagnetic signatures as well as a plurality of authorized electromagnetic signatures. The device is positioned or gestured in proximity of the accessible unit and the magnetometer captures the created electromagnetic signature. The method begins with the authentication initiation S1260. This initiation may occur through a button press, a detected proximity, a received signal, a timer expiration, etc. The magnetometer of the accessible unit scans for an electromagnetic signature S1261. When an electromagnetic signature is detected, the electromagnetic signature is captured by the magnetometer S1262. According to logic on the memory, the processor then compares the captured electromagnetic signature with the authorized electromagnetic signatures on the memory S1263. The processor determines whether there is a match between the captured electromagnetic signature and an authorized electromagnetic signature S1264. If there is a match, access is granted to the accessible unit S1265. This may occur, for instance, by the server causing an actuator on the accessible unit to open the accessible unit, by a network connection being established, etc. If there is not a match, access is not granted to the accessible unit S1266, and the magnetometer scans for a new electromagnetic signature S1261. In embodiments of the present subject disclosure, after a certain number of false electromagnetic signatures is received, access to the accessible unit may be blocked for a time period, may require further authentication in addition to the electromagnetic signature, etc.
Embodiments of the present subject disclosure utilize the electromagnetic field of the human body for authentication. Each human body has a slightly different electromagnetic signature that these embodiments may capture and utilize. The device may require, for instance, a specific user for access to different features on the device. Proximity to different areas of the body may produce different results in the device. This may require training on the part of a new user, building a database which is later used to execute pattern matching. The sensitivity of the magnetometer may allow for more or less complexities of positioning and/or motions of the user.
In exemplary embodiments, a device with a magnetometer detects the unique signatures of the human heart and brain to authenticate a user. Features of the device unlock when the correct user is holding the device. Furthermore, features of the device unlock based upon the user's positioning of the device. For instance, different features unlock as the user repositions the device from the user's pocket to the user's hand. Further features unlock and/or automatically load when the user repositions the device, such as within a close proximity of the user's ear. For example, positioning the device near the user's ear instructs the device to dial a number on the display of the device. When the device is removed from the ear, the call may end, switch to a speakerphone mode, etc. Each different position of the device may provide authentication for a different feature. Because electromagnetic signals from the human body are fairly weak, a means of amplification may be utilized to strengthen these signals.
As different users have different electromagnetic signatures, a device may contain different personas to use based upon the user. For example, when a first user is holding the device, a persona for that first user is accessed on the device. This may contain contacts for the first user, applications for the first user, settings for the first user, etc. When a second user picks up the device, the persona for that second user becomes active. This new persona may have different contacts, different applications, different settings, etc.
FIG. 13 shows a biometric based authentication, according to an exemplary embodiment of the present subject disclosure. A human body, such asuser1319 has its own electromagnetic signature. Abrain1317 and aheart1318 ofuser1319 both produce a magnetic field that can be detected by a magnetometer. Adevice1300 with a magnetometer may use the unique electromagnetic signature ofuser1319 to unlock or otherwise authenticatedevice1300 or features ofdevice1300. For instance,device1300 can detect that it is approximately located in the pocket ofuser1319 based upon the electromagnetic signature received by the magnetometer ofdevice1300. Whendevice1300 is in the pocket ofuser1319, for instance, logic ondevice1300 determines that a keypad ofdevice1300 remains locked.Device1300 can similarly detect that it is in the hand ofuser1319 based on the different electromagnetic signature. For instance,device1300 may detect an electromagnetic signature caused by the placement of fingers wrapped arounddevice1300. Whendevice1300 is detected to be in the hand ofuser1319, logic ondevice1300 determines that the keypad ofdevice1300 may unlock. Additionally, because the electromagnetic signature ofuser1319 is different than that of other potential users,device1300, or features ofdevice1300, may only unlock when the electromagnetic signature ofuser1319 is detected. The logic ondevice1300 may specify that only the correct user may usedevice1300. Thus, only the unique electromagnetic signature ofuser1319unlocks device1300 or features ofdevice1300.
In further embodiments of the subject disclosure, an electromagnetic signature of a human body may be used to unlock an accessible unit. This may require simply the presence of an authorized user, a correct positioning of a user, a correct gesture by the user, etc. For example, the accessible unit may unlock when the user walks up and waves his or her right hand. Alternatively, the user may sign his or her name in the air to unlock the accessible unit. The positioning and gestures made by a user may require the unique electromagnetic signature of an authorized user or may allow for some variation such that any user in the correct positioning or making the correct gestures may unlock the accessible unit. Requiring an authorized user to make a correct gesture provides for a double authentication which adds a level of security to the authorization.
FIG. 14 shows a biometric based authentication, according to an exemplary embodiment of the present subject disclosure. In this embodiment, the unique electromagnetic signature of auser1419 is used to authenticateuser1419 to accessaccessible unit1422. Similar toFIG. 13, abrain1417 and aheart1418 ofuser1419 create a unique electromagnetic signature ofuser1419.Accessible unit1422 includes amagnetometer1424 which detects and captures this electromagnetic signature. Aserver1420 with an onboard memory and processor may then compare the electromagnetic signature ofuser1419 with authorized electromagnetic signatures. If the detected electromagnetic signature matches an authorized electromagnetic signature, access is granted toaccessible unit1422. If the detected electromagnetic signature does not match an authorized electromagnetic signature, access toaccessible unit1422 remains locked.
In addition to simply detecting the presence of the correct user, authentication may require a gesture by the user. The gesturing by the user may create a different electromagnetic signature than the simple presence of the user and may be used for authentication. For example, authentication may require the user to spin around, waive a hand, stand on one foot, etc. The unique electromagnetic signature captured is compared with a database, with a match to the database providing the authentication.
FIG. 15 shows a method of biometric authentication, according to an exemplary embodiment of the present subject disclosure. In this embodiment, an electromagnetic signature is captured from a human body to provide authentication. A user is in range of a magnetometer of a device such that an integrated magnetometer in the device captures the electromagnetic signature of the user. Capturing the user's electromagnetic signature may, for instance, allow the device to determine whether the user is authorized, whether the device is in a location of use, etc. A location of use, for instance, may be the detection of a cellular telephone near the ear of the user. The method begins with the magnetometer scanning for an electromagnetic signature S1587. The magnetometer and device determine the electromagnetic signature S1588. This may include screening out certain interferences caused by sources other than the user. The device then attempts to match the determined electromagnetic signature with authorized electromagnetic signatures S1589. It is determined whether a match is found S1590. If a match is found, then the feature associated with the matched electromagnetic signature is unlocked S1591. For instance, if the determined electromagnetic signature matches a stored electromagnetic signature for the device being located in the user's hand, then the screen and keypad are unlocked. If a match is not found, then the locked features of the device remain locked S1592.
FIG. 16 shows a screenshot of settings for electromagnetic authentication, according to an exemplary embodiment of the present subject disclosure. Asetup screen1694 allows a user to program an authentication mechanism for adevice1600. In this embodiment,setup screen1694 includes afeature1695, a detectedmagnetic field1696, anallowance option1697, an ‘OK’button1698, and a ‘Cancel button’1699.Feature1695 allows the user to select a certain application, network, persona, etc., to allow upon authentication. For example, if the user wants to program an authentication mechanism for a work application ondevice1600, then the user selects or enters the name of the work application. Detectedmagnetic field1696 allows the user to view a representation of a magnetic field's strength, direction, etc., which is being used for authentication purposes. This electromagnetic signature is captured and must be matched to later access the selected feature ofdevice1600.Allowance option1697 allows the user to set a threshold for variation from a set electromagnetic signature which is still authorized. For example, it may be desired that a slightly different position in the room is acceptable for the device.Allowance option1697 provides for this. Once complete, if the user has trouble with authorization, then increasing the allowance may result in easier authorization.OK button1698 accepts the current settings ofsetup screen1694. Cancelbutton1699 rejects any changes made onsetup screen1694.
Embodiments of the subject disclosure may enable new features and services beyond that of security and authentication. Embodiments may allow for a larger language of gesture vocabulary for interacting with applications. For example, a gesture in a particular direction may move a pointer, make a selection, etc. These and other features would be readily apparent to one of ordinary skill in the art in light of this disclosure.
The foregoing disclosure of the exemplary embodiments of the present subject disclosure has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the subject disclosure to the precise forms disclosed. Many variations and modifications of the embodiments described herein will be apparent to one of ordinary skill in the art in light of the above disclosure. The scope of the subject disclosure is to be defined only by the claims appended hereto, and by their equivalents.
Further, in describing representative embodiments of the present subject disclosure, the specification may have presented the method and/or process of the present subject disclosure as a particular sequence of steps. However, to the extent that the method or process does not rely on the particular order of steps set forth herein, the method or process should not be limited to the particular sequence of steps described. As one of ordinary skill in the art would appreciate, other sequences of steps may be possible. Therefore, the particular order of the steps set forth in the specification should not be construed as limitations on the claims. In addition, the claims directed to the method and/or process of the present subject disclosure should not be limited to the performance of their steps in the order written, and one skilled in the art can readily appreciate that the sequences may be varied and still remain within the spirit and scope of the present subject disclosure.

Claims (20)

What is claimed is:
1. A communication device comprising:
a processor; and
a memory that stores instructions that, when executed by the processor, cause the processor to perform operations comprising
receiving, in response to the communication device being positioned proximate a portion of a human body of a user, an electromagnetic signature of an electromagnetic field produced by the portion of the human body of the user,
providing, based on the electromagnetic signature of the electromagnetic field produced by the portion of the human body of the user, access to a feature of a plurality of features of the communication device,
receiving, in response to the communication device being repositioned proximate a different portion of the human body of the user, a different electromagnetic signature of an electromagnetic field produced by the different portion of the human body of the user, and
providing, based on the different electromagnetic signature of the electromagnetic field produced by the different portion of the human body of the user, access to a different feature of the plurality of features of the communication device.
2. The communication device ofclaim 1, wherein providing, based on the electromagnetic signature of the electromagnetic field produced by the portion of the human body of the user, access to the feature of the plurality of features of the communication device comprises unlocking the feature of the plurality of features of the communication device.
3. The communication device ofclaim 1, wherein providing, based on the electromagnetic signature of the electromagnetic field produced by the portion of the human body of the user, access to the feature of the plurality of features of the communication device comprises loading the feature of the plurality of features of the communication device.
4. The communication device ofclaim 1, wherein providing, based on the different electromagnetic signature of the electromagnetic field produced by the different portion of the human body of the user, access to the different feature of the plurality of features of the communication device comprises loading the different feature of the plurality of features of the communication device.
5. The communication device ofclaim 1, wherein the operations further comprise activating, based on the electromagnetic signature of the electromagnetic field produced by at least the portion of the human body of the user, a persona associated with the communication device.
6. The communication device ofclaim 5, wherein the persona comprises at least one of contacts for the user, applications for the user, or settings for the user.
7. The communication device ofclaim 5, wherein the operations further comprise:
receiving an electromagnetic signature of an electromagnetic field produced by at least a portion of a human body of a different user; and
activating, based on the electromagnetic signature of the electromagnetic field produced by at least the portion of the human body of the different user, a different persona associated with the communication device.
8. The communication device ofclaim 1, wherein the operations further comprise:
determining, based on the electromagnetic signature, that the communication device is positioned proximate to the portion of the human body of the user, wherein the feature of the plurality of features is associated with the communication device being positioned proximate to the portion of the human body; and
determining, based on the different electromagnetic signature, that the communication device is repositioned proximate to the different portion of the human body of the user, wherein the different feature of the plurality of features is associated with the communication device being repositioned proximate to the different portion of the human body of the user.
9. A memory storing instructions that, when executed by a processor of a communication device, cause the processor to perform operations comprising:
receiving, in response to the communication device being positioned proximate a portion of a human body of a user, an electromagnetic signature of an electromagnetic field produced by the portion of the human body of the user;
providing, based on the electromagnetic signature of the electromagnetic field produced by the portion of the human body of the user, access to a feature of a plurality of features of the communication device;
receiving, in response to the communication device being repositioned proximate a different portion of the human body of the user, a different electromagnetic signature of an electromagnetic field produced by the different portion of the human body of the user; and
providing, based on the different electromagnetic signature of the electromagnetic field produced by the different portion of the human body of the user, access to a different feature of the plurality of features of the communication device.
10. The memory ofclaim 9, wherein providing, based on the electromagnetic signature of the electromagnetic field produced by the portion of the human body of the user, access to the feature of the plurality of features of the communication device comprises unlocking the feature of the plurality of features of the communication device.
11. The memory ofclaim 9, wherein providing, based on the electromagnetic signature of the electromagnetic field produced by the portion of the human body of the user, access to the feature of the plurality of features of the communication device comprises loading the feature of the plurality of features of the communication device.
12. The memory ofclaim 9, wherein providing, based on the different electromagnetic signature of the electromagnetic field produced by the different portion of the human body of the user, access to the different feature of the plurality of features of the communication device comprises loading the different feature of the plurality of features of the communication device.
13. The memory ofclaim 9, wherein the operations further comprise activating, based on the electromagnetic signature of the electromagnetic field produced by the portion of the human body of the user, a persona associated with the communication device.
14. The memory ofclaim 13, wherein the persona comprises at least one of contacts for the user, applications for the user, or settings for the user.
15. The memory ofclaim 13, wherein the operations further comprise:
receiving an electromagnetic signature of an electromagnetic field produced by at least a portion of a human body of a different user; and
activating, based on the electromagnetic signature of the electromagnetic field produced by at least the portion of the human body of the different user, a different persona associated with the communication device.
16. The memory ofclaim 9, wherein the operations further comprise:
determining, based on the electromagnetic signature, that the communication device is positioned proximate to the portion of the human body of the user, wherein the feature of the plurality of features is associated with the communication device being positioned proximate to the portion of the human body; and
determining, based on the different electromagnetic signature, that the communication device is repositioned proximate to the different portion of the human body of the user, wherein the different feature of the plurality of features is associated with the communication device being repositioned proximate to the different portion of the human body of the user.
17. A method comprising:
receiving, by a communication device comprising a processor in response to the communication device being positioned proximate a portion of a human body of a user, an electromagnetic signature of an electromagnetic field produced by the portion of the human body of the user;
providing, by the communication device, based on the electromagnetic signature of the electromagnetic field produced by the portion of the human body of the user, access to a feature of a plurality of features of the communication device;
receiving, by the communication device in response to the communication device being repositioned proximate a different portion of the human body of the user, a different electromagnetic signature of an electromagnetic field produced by a different portion of the human body of the user; and
providing, by the communication device, based on the different electromagnetic signature of the electromagnetic field produced by the different portion of the human body of the user, access to a different feature of the plurality of features of the communication device.
18. The method ofclaim 17, further comprising activating, based on the electromagnetic signature of the electromagnetic field produced by the portion of the human body of the user, a persona associated with the communication device, wherein the persona comprises at least one of contacts for the user, applications for the user, or settings for the user.
19. The method ofclaim 18, further comprising:
receiving an electromagnetic signature of an electromagnetic field produced by at least a portion of a human body of a different user; and
activating, based on the electromagnetic signature of the electromagnetic field produced by at least the portion of the human body of the different user, a different persona associated with the communication device, wherein the different person comprises at least one of contacts for the different user, applications for the different user, or settings for the different user.
20. The method ofclaim 17, further comprising:
determining, by the communication device based on the electromagnetic signature, that the communication device is positioned proximate to the portion of the human body of the user, wherein the feature of the plurality of features is associated with the communication device being positioned proximate to the portion of the human body; and
determining, by the communication device based on the different electromagnetic signature, that the communication device is repositioned proximate to the different portion of the human body of the user, wherein the different feature of the plurality of features is associated with the communication device being repositioned proximate to the different portion of the human body of the user.
US15/707,0192011-07-122017-09-18Devices, systems, and methods for security using magnetic field based identificationExpired - Fee RelatedUS10523670B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/707,019US10523670B2 (en)2011-07-122017-09-18Devices, systems, and methods for security using magnetic field based identification

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US13/180,805US8752200B2 (en)2011-07-122011-07-12Devices, systems and methods for security using magnetic field based identification
US14/299,400US9197636B2 (en)2011-07-122014-06-09Devices, systems and methods for security using magnetic field based identification
US14/948,567US9769165B2 (en)2011-07-122015-11-23Devices, systems and methods for security using magnetic field based identification
US15/707,019US10523670B2 (en)2011-07-122017-09-18Devices, systems, and methods for security using magnetic field based identification

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/948,567ContinuationUS9769165B2 (en)2011-07-122015-11-23Devices, systems and methods for security using magnetic field based identification

Publications (2)

Publication NumberPublication Date
US20180007044A1 US20180007044A1 (en)2018-01-04
US10523670B2true US10523670B2 (en)2019-12-31

Family

ID=47519731

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US13/180,805ActiveUS8752200B2 (en)2011-07-122011-07-12Devices, systems and methods for security using magnetic field based identification
US14/299,400ActiveUS9197636B2 (en)2011-07-122014-06-09Devices, systems and methods for security using magnetic field based identification
US14/948,567ActiveUS9769165B2 (en)2011-07-122015-11-23Devices, systems and methods for security using magnetic field based identification
US15/707,019Expired - Fee RelatedUS10523670B2 (en)2011-07-122017-09-18Devices, systems, and methods for security using magnetic field based identification

Family Applications Before (3)

Application NumberTitlePriority DateFiling Date
US13/180,805ActiveUS8752200B2 (en)2011-07-122011-07-12Devices, systems and methods for security using magnetic field based identification
US14/299,400ActiveUS9197636B2 (en)2011-07-122014-06-09Devices, systems and methods for security using magnetic field based identification
US14/948,567ActiveUS9769165B2 (en)2011-07-122015-11-23Devices, systems and methods for security using magnetic field based identification

Country Status (1)

CountryLink
US (4)US8752200B2 (en)

Families Citing this family (107)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7800471B2 (en)2008-04-042010-09-21Cedar Ridge Research, LlcField emission system and method
US8179219B2 (en)2008-04-042012-05-15Correlated Magnetics Research, LlcField emission system and method
US9371923B2 (en)2008-04-042016-06-21Correlated Magnetics Research, LlcMagnetic valve assembly
US9105380B2 (en)2008-04-042015-08-11Correlated Magnetics Research, Llc.Magnetic attachment system
US8174347B2 (en)2010-07-122012-05-08Correlated Magnetics Research, LlcMultilevel correlated magnetic system and method for using the same
US8760250B2 (en)2009-06-022014-06-24Correlated Magnetics Rsearch, LLC.System and method for energy generation
US9202616B2 (en)2009-06-022015-12-01Correlated Magnetics Research, LlcIntelligent magnetic system
US9202615B2 (en)2012-02-282015-12-01Correlated Magnetics Research, LlcSystem for detaching a magnetic structure from a ferromagnetic material
US8576036B2 (en)2010-12-102013-11-05Correlated Magnetics Research, LlcSystem and method for affecting flux of multi-pole magnetic structures
US8816805B2 (en)2008-04-042014-08-26Correlated Magnetics Research, Llc.Magnetic structure production
US9275783B2 (en)2012-10-152016-03-01Correlated Magnetics Research, Llc.System and method for demagnetization of a magnetic structure region
US9404776B2 (en)2009-06-022016-08-02Correlated Magnetics Research, Llc.System and method for tailoring polarity transitions of magnetic structures
US8704626B2 (en)2010-05-102014-04-22Correlated Magnetics Research, LlcSystem and method for moving an object
US9257219B2 (en)2012-08-062016-02-09Correlated Magnetics Research, Llc.System and method for magnetization
US9711268B2 (en)2009-09-222017-07-18Correlated Magnetics Research, LlcSystem and method for tailoring magnetic forces
US8702437B2 (en)2011-03-242014-04-22Correlated Magnetics Research, LlcElectrical adapter system
US9219403B2 (en)2011-09-062015-12-22Correlated Magnetics Research, LlcMagnetic shear force transfer device
KR101831691B1 (en)*2011-10-142018-03-02삼성전자주식회사Apparatas and method for auto disenabling of locking function in a portable terminal
EP2850488A4 (en)2012-05-182016-03-02Reald IncDirectional backlight
KR102099590B1 (en)2012-05-182020-04-10리얼디 스파크, 엘엘씨Controlling light sources of a directional backlight
US9188731B2 (en)2012-05-182015-11-17Reald Inc.Directional backlight
JP5998702B2 (en)*2012-07-242016-09-28富士通株式会社 Information processing system, server, portable terminal device, and control program
US9245677B2 (en)2012-08-062016-01-26Correlated Magnetics Research, Llc.System for concentrating and controlling magnetic flux of a multi-pole magnetic structure
US9298281B2 (en)2012-12-272016-03-29Correlated Magnetics Research, Llc.Magnetic vector sensor positioning and communications system
CN111487707A (en)2013-02-222020-08-04瑞尔D斯帕克有限责任公司 directional backlight
EP2989582A4 (en)*2013-04-242017-04-05Hewlett-Packard Enterprise Development LPDisplacement signatures
EP2989581A4 (en)*2013-04-242017-01-11Hewlett-Packard Enterprise Development LPLocation signatures
US9282086B2 (en)*2013-04-262016-03-08Broadcom CorporationMethods and systems for secured authentication of applications on a network
US8965599B2 (en)2013-05-012015-02-24Delphi Technologies, Inc.Passive entry and passive start system with operator walking detection
US9679053B2 (en)2013-05-202017-06-13The Nielsen Company (Us), LlcDetecting media watermarks in magnetic field data
FR3008570A1 (en)*2013-09-272015-01-16Orange METHOD FOR ESTABLISHING COMMUNICATION BASED ON ENVIRONMENTAL MAGNETIC CONDITIONS
KR102366346B1 (en)2013-10-142022-02-23리얼디 스파크, 엘엘씨Light input for directional backlight
CN105099677B (en)2014-04-212018-12-14阿里巴巴集团控股有限公司A kind of verification method and equipment based on magnetometer
JP6510231B2 (en)2014-08-272019-05-08京セラ株式会社 Portable electronic devices
JP6243835B2 (en)*2014-08-272017-12-06京セラ株式会社 Portable electronic device and control method
CN105488869A (en)*2014-09-162016-04-13深圳富泰宏精密工业有限公司Code lock unlocking system and code lock unlocking method
WO2016057690A1 (en)2014-10-082016-04-14Reald Inc.Directional backlight
US20160182496A1 (en)*2014-12-172016-06-23Intel CorporationExtension of trust in a body area network
US9614829B1 (en)2015-03-272017-04-04EMC IP Holding Company LLCDeauthentication in multi-device user environments
WO2016168345A1 (en)2015-04-132016-10-20Reald Inc.Wide angle imaging directional backlights
SG10201603772TA (en)*2015-05-122016-12-2918 Degrees Lab Pte LtdMethods and systems for authenticating a user device based on ambient electromagnetic signals
US9817957B1 (en)2015-06-042017-11-14EMC IP Holding Company LLCAccess management based on active environment comprising dynamically reconfigurable sets of smart objects
US9923891B2 (en)*2015-06-262018-03-20Intel CorporationHuman body communication device with secure access
US10475418B2 (en)2015-10-262019-11-12Reald Spark, LlcIntelligent privacy system, apparatus, and method thereof
US11357290B2 (en)2016-03-152022-06-14Nike, Inc.Active footwear sensor calibration
US10390589B2 (en)2016-03-152019-08-27Nike, Inc.Drive mechanism for automated footwear platform
US10827804B2 (en)2016-03-152020-11-10Nike, Inc.Lacing apparatus for automated footwear platform
KR102494900B1 (en)2016-03-152023-02-01나이키 이노베이트 씨.브이. Capacitive Foot Presence Detection for Footwear
US11026481B2 (en)2016-03-152021-06-08Nike, Inc.Foot presence signal processing using velocity
US11064768B2 (en)2016-03-152021-07-20Nike, Inc.Foot presence signal processing using velocity
US10182309B2 (en)*2016-03-302019-01-15Honeywell International Inc.Magnetic fingerprinting for proximity-based systems
MX391775B (en)*2016-04-152025-03-12Assa Abloy Americas Residential Inc WIRELESS LOCK WITH INTEGRATED ANGLE OF ARRIVAL (AOA) DETECTION.
EP3458897B1 (en)2016-05-192025-04-02RealD Spark, LLCWide angle imaging directional backlights
CN105897747B (en)*2016-05-272020-04-03北京中金国信科技有限公司Data storage method and device based on digital biological signature and intelligent equipment
US20180049029A1 (en)*2016-08-112018-02-15Qualcomm IncorporatedIntelligent remote touch for touch screen devices
CN110113962B (en)2016-10-262022-06-07耐克创新有限合伙公司 Deformable Lace Guide for Automated Footwear Platforms
US11083248B2 (en)2016-10-262021-08-10Nike, Inc.Automated footwear platform having upper elastic tensioner
EP3531857B1 (en)2016-10-262022-08-17NIKE Innovate C.V.Lacing architecture for automated footwear platform
US11071353B2 (en)2016-10-262021-07-27Nike, Inc.Automated footwear platform having lace cable tensioner
US10140440B1 (en)*2016-12-132018-11-27Symantec CorporationSystems and methods for securing computing devices that are not in users' physical possessions
KR102805177B1 (en)2017-03-142025-05-08나이키 이노베이트 씨.브이.Footwear article and method for installing tensioning device
US20210199879A1 (en)2017-05-082021-07-01Reald Spark, LlcOptical stack for imaging directional backlights
CN116841075A (en)2017-05-082023-10-03瑞尔D斯帕克有限责任公司Optical stack for directional display
US10126575B1 (en)2017-05-082018-11-13Reald Spark, LlcOptical stack for privacy display
US10701531B2 (en)*2017-08-092020-06-30Qualcomm IncorporatedEnvironmental sensing with wireless communication devices
TWI878209B (en)2017-09-152025-04-01美商瑞爾D斯帕克有限責任公司Display device and a view angle control optical element for application to a display device
US10948648B2 (en)2017-09-292021-03-16Reald Spark, LlcBacklights having stacked waveguide and optical components with different coefficients of friction
WO2019090246A1 (en)2017-11-062019-05-09Reald Spark, LlcPrivacy display apparatus
EP3484116B1 (en)2017-11-102021-05-12Telefonica Digital España, S.L.U.Method, system and application for improved authentication for mobile device users
KR102759510B1 (en)2018-01-252025-02-04리얼디 스파크, 엘엘씨 Touchscreen for privacy display
US10976578B2 (en)2018-01-252021-04-13Reald Spark, LlcReflective optical stack for privacy display
US10810291B2 (en)2018-03-212020-10-20Cirrus Logic, Inc.Ear proximity detection
EP3769516B1 (en)2018-03-222025-06-25RealD Spark, LLCOptical waveguide for directional backlight
CN110415389B (en)2018-04-272024-02-23开利公司Gesture access control system and method for predicting location of mobile device relative to user
CN110415387A (en)*2018-04-272019-11-05开利公司 Gesture entry control system comprising a mobile device disposed in a receptacle carried by a user
CN109039643B (en)*2018-06-282019-10-11中南民族大学A kind of sustainable method for authenticating user identity and system based on electromagnetic radiation
US11079645B2 (en)2018-06-292021-08-03Reald Spark, LlcStabilization for privacy display
WO2020018552A1 (en)2018-07-182020-01-23Reald Spark, LlcOptical stack for switchable directional display
US10810816B1 (en)*2018-08-282020-10-20Robert William KocherInformation-based, biometric, asynchronous access control system
US11106103B2 (en)2018-10-032021-08-31Reald Spark, LlcPrivacy display apparatus controlled in response to environment of apparatus
WO2020087110A1 (en)*2018-10-302020-05-07Mobile Technology Holdings LimitedElectronic device identification
US11092852B2 (en)2018-11-072021-08-17Reald Spark, LlcDirectional display apparatus
KR20200055983A (en)*2018-11-142020-05-22삼성전자주식회사Method for estimating electromagnatic signal radiated from device and an electronic device thereof
US11287677B2 (en)2019-01-072022-03-29Reald Spark, LlcOptical stack for privacy display
US11029566B2 (en)2019-02-122021-06-08Reald Spark, LlcDiffuser for privacy display
BR112021016978A2 (en)*2019-03-212021-11-30Lexmark Int Inc Device and method for scanning the physical signature data of an unclonable physical function with a smartphone
TW202102883A (en)2019-07-022021-01-16美商瑞爾D斯帕克有限責任公司Directional display apparatus
WO2021026018A1 (en)2019-08-022021-02-11Reald Spark, LlcOptical stack for privacy display
US11550938B2 (en)*2019-09-032023-01-10Science Applications International CorporationAutomatic device zeroization
EP4038605B1 (en)2019-10-022024-09-25RealD Spark, LLCPrivacy display apparatus
US11733578B2 (en)2019-11-132023-08-22ReaID Spark, LLCDisplay device with uniform off-axis luminance reduction
CN114761844A (en)2019-12-102022-07-15瑞尔D斯帕克有限责任公司Control of reflection of display device
WO2021126707A1 (en)2019-12-182021-06-24Reald Spark, LlcControl of ambient light for a privacy display
US11353752B2 (en)2020-04-302022-06-07Reald Spark, LlcDirectional display apparatus
WO2021222598A1 (en)2020-04-302021-11-04Reald Spark, LlcDirectional display apparatus
WO2021222606A1 (en)2020-04-302021-11-04Reald Spark, LlcDirectional display apparatus
EP4189285A4 (en)2020-07-292024-07-24RealD Spark, LLC REAR LIGHTING FOR A SWITCHABLE DIRECTION INDICATOR
EP4189447A4 (en)2020-07-292024-07-31RealD Spark, LLCPupillated illumination apparatus
CN116194812A (en)2020-09-162023-05-30瑞尔D斯帕克有限责任公司 Vehicle Exterior Lighting
BR102021001278A2 (en)2021-01-222022-08-09Rogerio Atem De Carvalho DEVICE AND METHOD FOR AUTHENTICATION OF HARDWARE AND/OR EMBEDDED SOFTWARE
US11892717B2 (en)2021-09-302024-02-06Reald Spark, LlcMarks for privacy display
WO2023154217A1 (en)2022-02-092023-08-17Reald Spark, LlcObserver-tracked privacy display
EP4505240A1 (en)2022-04-072025-02-12RealD Spark, LLCDirectional display apparatus
US11966049B2 (en)2022-08-022024-04-23Reald Spark, LlcPupil tracking near-eye display
WO2024035796A1 (en)2022-08-112024-02-15Reald Spark, LlcAnamorphic directional illumination device
WO2024226506A1 (en)2023-04-252024-10-31Reald Spark, LlcSwitchable privacy display
WO2025030030A2 (en)2023-08-032025-02-06Reald Spark, LlcPrivacy displays

Citations (114)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5142655A (en)1987-10-141992-08-25Wang Laboratories, Inc.Computer input device using an orientation sensor
US5317317A (en)1992-03-101994-05-31Thomson-CsfMethod and device to detect the garbling of pulses received by a secondary radar by phase analysis
US5426666A (en)1989-02-211995-06-20Canon Kabushiki KaishaCommunication apparatus
US5428342A (en)1991-04-251995-06-27Hitachi, Ltd.Analyzing system for operating condition of electrical apparatus
US5523746A (en)1994-09-011996-06-04Gallagher; Robert R.Identification system with a passive activator
US5554980A (en)1993-03-121996-09-10Mitsubishi Denki Kabushiki KaishaRemote control system
US5574964A (en)1995-05-301996-11-12Apple Computer, Inc.Signal distribution system
US5704836A (en)1995-03-231998-01-06Perception Systems, Inc.Motion-based command generation technology
US5726645A (en)1993-09-281998-03-10Sony CorporationRemote controller capable of selecting and setting preset data
US5727553A (en)1996-03-251998-03-17Saad; Saad A.Catheter with integral electromagnetic location identification device
US5734371A (en)1994-12-191998-03-31Lucent Technologies Inc.Interactive pointing device
US5974236A (en)1992-03-251999-10-26Aes CorporationDynamically reconfigurable communications network and method
US6006089A (en)1996-03-061999-12-21Leader Electronics Corp.System and method of measuring electric field strength
US6101428A (en)1999-05-282000-08-08Jon Snyder, Inc.Auto remote control with signal strength discrimination
US6104922A (en)*1998-03-022000-08-15Motorola, Inc.User authentication in a communication system utilizing biometric information
US6170439B1 (en)1999-06-242001-01-09Tri-Tronics, Inc.Remote controlled animal training system
US6256476B1 (en)1998-06-252001-07-03Conexant Systems, Inc.Power management for a telephone system by dynamically adjusting transmission power
US6259912B1 (en)1997-11-202001-07-10Samsung Electronics Co., Ltd.Apparatus and method for measurement of transmission power of base station and call-test of base station in a digital mobile communication system
US6307952B1 (en)1999-03-032001-10-23Disney Enterprises, Inc.Apparatus for detecting guest interactions and method therefore
US6314127B1 (en)1999-02-232001-11-06Lucent Technologies Inc.System and method for enhancing signal reception
US6317028B1 (en)1998-07-242001-11-13Electronic Security And Identification LlcElectronic identification, control, and security system and method for consumer electronics and the like
US6316710B1 (en)1999-09-272001-11-13Eric LindemannMusical synthesizer capable of expressive phrasing
US20010043145A1 (en)1997-10-102001-11-22James E. JacobsonAddressable distributed wireless remote control system
US20020016673A1 (en)2000-05-172002-02-07Flick Kenneth E.Vehicle tracker including input/output features and related methods
US20020024427A1 (en)2000-08-232002-02-28Siemens Automotive CorporationPassive RF-RF entry system for vehicles
US20020024422A1 (en)2000-06-122002-02-28Turner Christopher Gordon GervaseReading protocol for transponders of electronic identification system
US6380642B1 (en)1999-02-252002-04-30Siemens AktiengesellschaftMethod for starting a motor vehicle and ignition-starter device
US20020089412A1 (en)2001-01-092002-07-11Siemens AktiengesellschaftControl system with user authentication
US6494225B1 (en)1999-11-232002-12-17Ecp Family PropertiesProportional flow control valve
US20030023435A1 (en)2000-07-132003-01-30Josephson Daryl CraigInterfacing apparatus and methods
US20030087660A1 (en)2001-11-082003-05-08Andrew SendonarisPower estimation using weighted sum of pilot and non-pilot symbols
US6636763B1 (en)1998-12-102003-10-21Andrew JunkerBrain-body actuated system
US20040068409A1 (en)2002-10-072004-04-08Atau TanakaMethod and apparatus for analysing gestures produced in free space, e.g. for commanding apparatus by gesture recognition
US6747632B2 (en)1997-03-062004-06-08Harmonic Research, Inc.Wireless control device
US20040110481A1 (en)2002-12-072004-06-10Umesh NavsariwalaAntenna and wireless device utilizing the antenna
US20040155792A1 (en)2003-02-062004-08-12Victor JoynerSubnet addressable radio activated switch
US20040164875A1 (en)2003-02-242004-08-26Dischert Lee R.Method and apparatus for positive control of devices with toggle power control
US20050024228A1 (en)2001-12-212005-02-03Bruno VignonMethod for matching transmitters and receiver
US20050110639A1 (en)2003-11-242005-05-26Daniel PuzioWireless asset monitoring and security system using user identification tags
US20050125837A1 (en)2001-07-052005-06-09Wave7 Optics, Inc.Method and system for providing a return path for signals generated by legacy video service terminals in an optical network
US20050143961A1 (en)2003-12-252005-06-30Syh-Shoei LinUniversal power measurement SoC and measuring method
US6928342B2 (en)2002-10-312005-08-09Beltpack CorporationMethod and apparatus implementing a communication protocol for use in a control system
US20050212767A1 (en)2004-03-232005-09-29Marvit David LContext dependent gesture response
US6952198B2 (en)1999-07-062005-10-04Hansen Karl CSystem and method for communication with enhanced optical pointer
US20050225453A1 (en)2004-04-102005-10-13Samsung Electronics Co., Ltd.Method and apparatus for controlling device using three-dimensional pointing
US6957021B2 (en)2001-02-052005-10-18Finisar CorporationOptical transceiver with memory mapped locations
US20050237295A1 (en)2004-04-092005-10-27Glen AndersonComputer and RFID-based input devices
US20050258936A1 (en)2004-05-192005-11-24Riad GhabraVehicle independent passive entry system
US20060019679A1 (en)2004-07-232006-01-26Rappaport Theodore SSystem, method, and apparatus for determining and using the position of wireless devices or infrastructure for wireless network enhancements
US20060028429A1 (en)*2004-08-092006-02-09International Business Machines CorporationControlling devices' behaviors via changes in their relative locations and positions
US20060031786A1 (en)2004-08-062006-02-09Hillis W DMethod and apparatus continuing action of user gestures performed upon a touch sensitive interactive display in simulation of inertia
US7005959B2 (en)2002-05-312006-02-28Fuji Jukogyo Kabushiki KaishaKey-less entry system for vehicle
US20060071753A1 (en)2004-09-242006-04-06David LamarElectronically enabling devices remotely
US20060092040A1 (en)2004-11-022006-05-04Fishkin Kenneth PDetecting activity of RFID objects via multiple tags/readers
US20060091997A1 (en)2004-11-012006-05-04Bruce ConnerSelectable range remote entry system
US20060103503A1 (en)2004-11-122006-05-18Yan RodriguezNetworked movable barrier operator system
US20060187196A1 (en)2005-02-082006-08-24Underkoffler John SSystem and method for gesture based control system
US7116988B2 (en)2004-03-162006-10-03Airespace, Inc.Location of wireless nodes using signal strength weighting metric
US20060235633A1 (en)2005-04-152006-10-19The Regents Of The University Of CaliforniaPoynting-vector based method for determining the bearing and location of electromagnetic sources
US20060235805A1 (en)2005-04-132006-10-19Mr. Feng PengUniversal anti-counterfeit method and system
US20060246841A1 (en)2005-04-292006-11-02Dennis Gary JMethod and apparatus for reducing interference associated with wireless communication
US20060271214A1 (en)1992-11-172006-11-30Health Hero Network, Inc.Home power management system
US7151435B2 (en)2002-11-262006-12-19Ge Medical Systems Information Technologies, Inc.Method and apparatus for identifying a patient
US7173604B2 (en)2004-03-232007-02-06Fujitsu LimitedGesture identification of controlled devices
US7176886B2 (en)2004-03-232007-02-13Fujitsu LimitedSpatial signatures
US7180502B2 (en)2004-03-232007-02-20Fujitsu LimitedHandheld device with preferred motion selection
US7180501B2 (en)2004-03-232007-02-20Fujitsu LimitedGesture based navigation of a handheld user interface
US20070046832A1 (en)2005-08-312007-03-01Lg Electronics Inc.Video apparatus and method of controlling the same
US20070105582A1 (en)2005-11-102007-05-10Freescale Semiconductor, Inc.System and method for controlling the transmit power of a wireless module
US7224980B2 (en)2000-08-302007-05-29Omron CorporationRadio system
USRE39677E1 (en)1995-12-062007-06-05Alcatel Usa Sourcing, L.P.Local multipoint distribution system
US20070146118A1 (en)2004-11-122007-06-28Yan RodriguezNetworked movable barrier operator system
US20070156618A1 (en)2005-12-092007-07-05Tegic Communications, Inc.Embedded rule engine for rendering text and other applications
US7248151B2 (en)2005-01-052007-07-24General Motors CorporationVirtual keypad for vehicle entry control
US20070206838A1 (en)*2006-02-222007-09-06Fouquet Julie ETime synchronous biometric authentication
US7289025B2 (en)2003-12-192007-10-30International Business Machines CorporationMethod and system for securing an electronic device
US20070279241A1 (en)2006-05-312007-12-06Searete Llc, A Limited Liability Corporation Of The State Of DelawareVehicle control and communication via device in proximity
US20080005351A1 (en)2006-06-282008-01-03Mario NeugebauerTransmission range adjustment according to network conditions
US20080065235A1 (en)2006-09-072008-03-13Technology, Patents & Licensing, Inc.Data Presentation by User Movement in Multiple Zones Using a Wireless Home Entertainment Hub
US7365736B2 (en)2004-03-232008-04-29Fujitsu LimitedCustomizable gesture mappings for motion controlled handheld devices
US20080114615A1 (en)2006-11-152008-05-15General Electric CompanyMethods and systems for gesture-based healthcare application interaction in thin-air display
US20080154576A1 (en)2006-12-212008-06-26Jianchao WuProcessing of reduced-set user input text with selected one of multiple vocabularies and resolution modalities
US7394346B2 (en)2002-01-152008-07-01International Business Machines CorporationFree-space gesture recognition for transaction security and command processing
US20080169929A1 (en)*2007-01-122008-07-17Jacob C AlbertsonWarning a user about adverse behaviors of others within an environment based on a 3d captured image stream
US20080170776A1 (en)2007-01-122008-07-17Albertson Jacob CControlling resource access based on user gesturing in a 3d captured image stream of the user
US7411506B2 (en)2003-03-032008-08-12Veroscan, Inc.Interrogator and interrogation system employing the same
US20080209543A1 (en)2007-02-232008-08-28Aaron Jeffrey AMethods, systems, and products for identity verification
US20080273764A1 (en)2004-06-292008-11-06Koninklijke Philips Electronics, N.V.Personal Gesture Signature
US20080294907A1 (en)*2007-05-212008-11-27Hively Lee MMethods for using a biometric parameter in the identification of persons
US7492367B2 (en)2005-03-102009-02-17Motus CorporationApparatus, system and method for interpreting and reproducing physical motion
US7570167B2 (en)2006-06-302009-08-04Gene FeinRFID ionosphere
US20090213134A1 (en)2003-04-092009-08-27James StephanickTouch screen and graphical user interface
US7594611B1 (en)2005-12-292009-09-29United Services Automobile Association (Usaa)Multi-account access card
US7596767B2 (en)2002-02-072009-09-29Microsoft CorporationSystem and process for controlling electronic components in a ubiquitous computing environment using multimodal integration
US20090262074A1 (en)2007-01-052009-10-22Invensense Inc.Controlling and accessing content using motion processing on mobile devices
US20090262069A1 (en)2008-04-222009-10-22Opentv, Inc.Gesture signatures
US20090271004A1 (en)*2008-04-282009-10-29Reese ZecchinMethod and apparatus for ranging detection of gestures
US20090296959A1 (en)2006-02-072009-12-03Bongiovi Acoustics, LlcMismatched speaker systems and methods
US7657763B2 (en)2005-12-292010-02-02Panasonic Electric Works Co., Ltd.Systems and methods for selectively controlling electrical outlets using power profiling
US20100083373A1 (en)2008-09-292010-04-01Scott WhiteMethods and apparatus for determining user authorization from motion of a gesture-based control unit
US7698002B2 (en)2006-09-292010-04-13Nellcor Puritan Bennett LlcSystems and methods for user interface and identification in a medical device
US20100103092A1 (en)2008-10-232010-04-29Tatung UniversityVideo-based handwritten character input apparatus and method thereof
US7868874B2 (en)2005-11-152011-01-11Synaptics IncorporatedMethods and systems for detecting a position-based attribute of an object using digital codes
US7907838B2 (en)2007-01-052011-03-15Invensense, Inc.Motion sensing and processing on mobile devices
US7953180B2 (en)2007-01-122011-05-31Panasonic CorporationTransmission power control method and transmission apparatus
US20110156867A1 (en)2009-12-302011-06-30Carlos CarrizoGesture-based signature authentication
US20110175822A1 (en)2010-01-212011-07-21Vincent PoonUsing a gesture to transfer an object across multiple multi-touch devices
US20110190060A1 (en)2010-02-022011-08-04Deutsche Telekom AgAround device interaction for controlling an electronic device, for controlling a computer game and for user verification
US8049599B2 (en)2006-12-292011-11-01Marvell World Trade Ltd.Power control device
US20110283354A1 (en)2007-09-272011-11-17Chang E LeeMulti-Touch Interfaces for User Authentication, Partitioning, and External Device Control
US20110300831A1 (en)2008-05-172011-12-08Chin David HAuthentication of a mobile device by a patterned security gesture applied to dotted input area
US8736420B2 (en)2007-01-292014-05-27At&T Intellectual Property I, L.P.Methods, systems, and products for controlling devices
US20190020676A1 (en)*2017-07-122019-01-17The Boeing CompanyMobile security countermeasures
US20190149653A1 (en)*2017-11-102019-05-16Telefónica Digital España, S.L.U.Method, system and application for improved authentication for mobile device users

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20100040293A1 (en)*2008-08-122010-02-18International Business Machines CorporationKinematic Based Authentication

Patent Citations (115)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5142655A (en)1987-10-141992-08-25Wang Laboratories, Inc.Computer input device using an orientation sensor
US5426666A (en)1989-02-211995-06-20Canon Kabushiki KaishaCommunication apparatus
US5428342A (en)1991-04-251995-06-27Hitachi, Ltd.Analyzing system for operating condition of electrical apparatus
US5317317A (en)1992-03-101994-05-31Thomson-CsfMethod and device to detect the garbling of pulses received by a secondary radar by phase analysis
US5974236A (en)1992-03-251999-10-26Aes CorporationDynamically reconfigurable communications network and method
US20060271214A1 (en)1992-11-172006-11-30Health Hero Network, Inc.Home power management system
US5554980A (en)1993-03-121996-09-10Mitsubishi Denki Kabushiki KaishaRemote control system
US5726645A (en)1993-09-281998-03-10Sony CorporationRemote controller capable of selecting and setting preset data
US5523746A (en)1994-09-011996-06-04Gallagher; Robert R.Identification system with a passive activator
US5734371A (en)1994-12-191998-03-31Lucent Technologies Inc.Interactive pointing device
US5704836A (en)1995-03-231998-01-06Perception Systems, Inc.Motion-based command generation technology
US5574964A (en)1995-05-301996-11-12Apple Computer, Inc.Signal distribution system
USRE39677E1 (en)1995-12-062007-06-05Alcatel Usa Sourcing, L.P.Local multipoint distribution system
US6006089A (en)1996-03-061999-12-21Leader Electronics Corp.System and method of measuring electric field strength
US5727553A (en)1996-03-251998-03-17Saad; Saad A.Catheter with integral electromagnetic location identification device
US6747632B2 (en)1997-03-062004-06-08Harmonic Research, Inc.Wireless control device
US20010043145A1 (en)1997-10-102001-11-22James E. JacobsonAddressable distributed wireless remote control system
US6259912B1 (en)1997-11-202001-07-10Samsung Electronics Co., Ltd.Apparatus and method for measurement of transmission power of base station and call-test of base station in a digital mobile communication system
US6104922A (en)*1998-03-022000-08-15Motorola, Inc.User authentication in a communication system utilizing biometric information
US6256476B1 (en)1998-06-252001-07-03Conexant Systems, Inc.Power management for a telephone system by dynamically adjusting transmission power
US6317028B1 (en)1998-07-242001-11-13Electronic Security And Identification LlcElectronic identification, control, and security system and method for consumer electronics and the like
US6636763B1 (en)1998-12-102003-10-21Andrew JunkerBrain-body actuated system
US6314127B1 (en)1999-02-232001-11-06Lucent Technologies Inc.System and method for enhancing signal reception
US6380642B1 (en)1999-02-252002-04-30Siemens AktiengesellschaftMethod for starting a motor vehicle and ignition-starter device
US6307952B1 (en)1999-03-032001-10-23Disney Enterprises, Inc.Apparatus for detecting guest interactions and method therefore
US6101428A (en)1999-05-282000-08-08Jon Snyder, Inc.Auto remote control with signal strength discrimination
US6170439B1 (en)1999-06-242001-01-09Tri-Tronics, Inc.Remote controlled animal training system
US6952198B2 (en)1999-07-062005-10-04Hansen Karl CSystem and method for communication with enhanced optical pointer
US6316710B1 (en)1999-09-272001-11-13Eric LindemannMusical synthesizer capable of expressive phrasing
US6494225B1 (en)1999-11-232002-12-17Ecp Family PropertiesProportional flow control valve
US20020016673A1 (en)2000-05-172002-02-07Flick Kenneth E.Vehicle tracker including input/output features and related methods
US20020024422A1 (en)2000-06-122002-02-28Turner Christopher Gordon GervaseReading protocol for transponders of electronic identification system
US20030023435A1 (en)2000-07-132003-01-30Josephson Daryl CraigInterfacing apparatus and methods
US20020024427A1 (en)2000-08-232002-02-28Siemens Automotive CorporationPassive RF-RF entry system for vehicles
US7224980B2 (en)2000-08-302007-05-29Omron CorporationRadio system
US20020089412A1 (en)2001-01-092002-07-11Siemens AktiengesellschaftControl system with user authentication
US6957021B2 (en)2001-02-052005-10-18Finisar CorporationOptical transceiver with memory mapped locations
US20050125837A1 (en)2001-07-052005-06-09Wave7 Optics, Inc.Method and system for providing a return path for signals generated by legacy video service terminals in an optical network
US20030087660A1 (en)2001-11-082003-05-08Andrew SendonarisPower estimation using weighted sum of pilot and non-pilot symbols
US20050024228A1 (en)2001-12-212005-02-03Bruno VignonMethod for matching transmitters and receiver
US7394346B2 (en)2002-01-152008-07-01International Business Machines CorporationFree-space gesture recognition for transaction security and command processing
US7596767B2 (en)2002-02-072009-09-29Microsoft CorporationSystem and process for controlling electronic components in a ubiquitous computing environment using multimodal integration
US7005959B2 (en)2002-05-312006-02-28Fuji Jukogyo Kabushiki KaishaKey-less entry system for vehicle
US20040068409A1 (en)2002-10-072004-04-08Atau TanakaMethod and apparatus for analysing gestures produced in free space, e.g. for commanding apparatus by gesture recognition
US6928342B2 (en)2002-10-312005-08-09Beltpack CorporationMethod and apparatus implementing a communication protocol for use in a control system
US7151435B2 (en)2002-11-262006-12-19Ge Medical Systems Information Technologies, Inc.Method and apparatus for identifying a patient
US20040110481A1 (en)2002-12-072004-06-10Umesh NavsariwalaAntenna and wireless device utilizing the antenna
US20040155792A1 (en)2003-02-062004-08-12Victor JoynerSubnet addressable radio activated switch
US20040164875A1 (en)2003-02-242004-08-26Dischert Lee R.Method and apparatus for positive control of devices with toggle power control
US7411506B2 (en)2003-03-032008-08-12Veroscan, Inc.Interrogator and interrogation system employing the same
US20090213134A1 (en)2003-04-092009-08-27James StephanickTouch screen and graphical user interface
US20050110639A1 (en)2003-11-242005-05-26Daniel PuzioWireless asset monitoring and security system using user identification tags
US7289025B2 (en)2003-12-192007-10-30International Business Machines CorporationMethod and system for securing an electronic device
US20050143961A1 (en)2003-12-252005-06-30Syh-Shoei LinUniversal power measurement SoC and measuring method
US7116988B2 (en)2004-03-162006-10-03Airespace, Inc.Location of wireless nodes using signal strength weighting metric
US7180502B2 (en)2004-03-232007-02-20Fujitsu LimitedHandheld device with preferred motion selection
US7180501B2 (en)2004-03-232007-02-20Fujitsu LimitedGesture based navigation of a handheld user interface
US7176886B2 (en)2004-03-232007-02-13Fujitsu LimitedSpatial signatures
US7365736B2 (en)2004-03-232008-04-29Fujitsu LimitedCustomizable gesture mappings for motion controlled handheld devices
US20050212767A1 (en)2004-03-232005-09-29Marvit David LContext dependent gesture response
US7173604B2 (en)2004-03-232007-02-06Fujitsu LimitedGesture identification of controlled devices
US20050237295A1 (en)2004-04-092005-10-27Glen AndersonComputer and RFID-based input devices
US20050225453A1 (en)2004-04-102005-10-13Samsung Electronics Co., Ltd.Method and apparatus for controlling device using three-dimensional pointing
US7046119B2 (en)2004-05-192006-05-16Lear CorporationVehicle independent passive entry system
US20050258936A1 (en)2004-05-192005-11-24Riad GhabraVehicle independent passive entry system
US20080273764A1 (en)2004-06-292008-11-06Koninklijke Philips Electronics, N.V.Personal Gesture Signature
US20060019679A1 (en)2004-07-232006-01-26Rappaport Theodore SSystem, method, and apparatus for determining and using the position of wireless devices or infrastructure for wireless network enhancements
US20060031786A1 (en)2004-08-062006-02-09Hillis W DMethod and apparatus continuing action of user gestures performed upon a touch sensitive interactive display in simulation of inertia
US20060028429A1 (en)*2004-08-092006-02-09International Business Machines CorporationControlling devices' behaviors via changes in their relative locations and positions
US20060071753A1 (en)2004-09-242006-04-06David LamarElectronically enabling devices remotely
US20060091997A1 (en)2004-11-012006-05-04Bruce ConnerSelectable range remote entry system
US20060092040A1 (en)2004-11-022006-05-04Fishkin Kenneth PDetecting activity of RFID objects via multiple tags/readers
US20060103503A1 (en)2004-11-122006-05-18Yan RodriguezNetworked movable barrier operator system
US20070146118A1 (en)2004-11-122007-06-28Yan RodriguezNetworked movable barrier operator system
US7248151B2 (en)2005-01-052007-07-24General Motors CorporationVirtual keypad for vehicle entry control
US20060187196A1 (en)2005-02-082006-08-24Underkoffler John SSystem and method for gesture based control system
US7492367B2 (en)2005-03-102009-02-17Motus CorporationApparatus, system and method for interpreting and reproducing physical motion
US20060235805A1 (en)2005-04-132006-10-19Mr. Feng PengUniversal anti-counterfeit method and system
US20060235633A1 (en)2005-04-152006-10-19The Regents Of The University Of CaliforniaPoynting-vector based method for determining the bearing and location of electromagnetic sources
US20060246841A1 (en)2005-04-292006-11-02Dennis Gary JMethod and apparatus for reducing interference associated with wireless communication
US20070046832A1 (en)2005-08-312007-03-01Lg Electronics Inc.Video apparatus and method of controlling the same
US20070105582A1 (en)2005-11-102007-05-10Freescale Semiconductor, Inc.System and method for controlling the transmit power of a wireless module
US7868874B2 (en)2005-11-152011-01-11Synaptics IncorporatedMethods and systems for detecting a position-based attribute of an object using digital codes
US20070156618A1 (en)2005-12-092007-07-05Tegic Communications, Inc.Embedded rule engine for rendering text and other applications
US7657763B2 (en)2005-12-292010-02-02Panasonic Electric Works Co., Ltd.Systems and methods for selectively controlling electrical outlets using power profiling
US7594611B1 (en)2005-12-292009-09-29United Services Automobile Association (Usaa)Multi-account access card
US20090296959A1 (en)2006-02-072009-12-03Bongiovi Acoustics, LlcMismatched speaker systems and methods
US20070206838A1 (en)*2006-02-222007-09-06Fouquet Julie ETime synchronous biometric authentication
US20070279241A1 (en)2006-05-312007-12-06Searete Llc, A Limited Liability Corporation Of The State Of DelawareVehicle control and communication via device in proximity
US20080005351A1 (en)2006-06-282008-01-03Mario NeugebauerTransmission range adjustment according to network conditions
US7570167B2 (en)2006-06-302009-08-04Gene FeinRFID ionosphere
US20080065235A1 (en)2006-09-072008-03-13Technology, Patents & Licensing, Inc.Data Presentation by User Movement in Multiple Zones Using a Wireless Home Entertainment Hub
US7698002B2 (en)2006-09-292010-04-13Nellcor Puritan Bennett LlcSystems and methods for user interface and identification in a medical device
US20080114615A1 (en)2006-11-152008-05-15General Electric CompanyMethods and systems for gesture-based healthcare application interaction in thin-air display
US20080154576A1 (en)2006-12-212008-06-26Jianchao WuProcessing of reduced-set user input text with selected one of multiple vocabularies and resolution modalities
US8049599B2 (en)2006-12-292011-11-01Marvell World Trade Ltd.Power control device
US7907838B2 (en)2007-01-052011-03-15Invensense, Inc.Motion sensing and processing on mobile devices
US20090262074A1 (en)2007-01-052009-10-22Invensense Inc.Controlling and accessing content using motion processing on mobile devices
US20080169929A1 (en)*2007-01-122008-07-17Jacob C AlbertsonWarning a user about adverse behaviors of others within an environment based on a 3d captured image stream
US20080170776A1 (en)2007-01-122008-07-17Albertson Jacob CControlling resource access based on user gesturing in a 3d captured image stream of the user
US7953180B2 (en)2007-01-122011-05-31Panasonic CorporationTransmission power control method and transmission apparatus
US8736420B2 (en)2007-01-292014-05-27At&T Intellectual Property I, L.P.Methods, systems, and products for controlling devices
US20080209543A1 (en)2007-02-232008-08-28Aaron Jeffrey AMethods, systems, and products for identity verification
US20080294907A1 (en)*2007-05-212008-11-27Hively Lee MMethods for using a biometric parameter in the identification of persons
US20110283354A1 (en)2007-09-272011-11-17Chang E LeeMulti-Touch Interfaces for User Authentication, Partitioning, and External Device Control
US20090262069A1 (en)2008-04-222009-10-22Opentv, Inc.Gesture signatures
US20090271004A1 (en)*2008-04-282009-10-29Reese ZecchinMethod and apparatus for ranging detection of gestures
US20110300831A1 (en)2008-05-172011-12-08Chin David HAuthentication of a mobile device by a patterned security gesture applied to dotted input area
US20100083373A1 (en)2008-09-292010-04-01Scott WhiteMethods and apparatus for determining user authorization from motion of a gesture-based control unit
US20100103092A1 (en)2008-10-232010-04-29Tatung UniversityVideo-based handwritten character input apparatus and method thereof
US20110156867A1 (en)2009-12-302011-06-30Carlos CarrizoGesture-based signature authentication
US20110175822A1 (en)2010-01-212011-07-21Vincent PoonUsing a gesture to transfer an object across multiple multi-touch devices
US20110190060A1 (en)2010-02-022011-08-04Deutsche Telekom AgAround device interaction for controlling an electronic device, for controlling a computer game and for user verification
US20190020676A1 (en)*2017-07-122019-01-17The Boeing CompanyMobile security countermeasures
US20190149653A1 (en)*2017-11-102019-05-16Telefónica Digital España, S.L.U.Method, system and application for improved authentication for mobile device users

Non-Patent Citations (33)

* Cited by examiner, † Cited by third party
Title
"Addressing Insider Threat using ‘Where You Are’ as Fourth Factor Authentication," Choi et al., 2012.
"Assessing the Vulnerability of Magnetic Gestural Authentication to Video-Based Shoulder Surfing Attacks," Shirazi et al. May 5-10, 2012.
"Detrended Cross-Correlation Analysis of Biometric Signals Used in a new Authentication Method," Ursulean et al., 2009.
"Dynamic Signature Verification using Embedded Sensors," Shastry et al, 2011 IEEE.
"Gesture Signature for Ambient Intelligence Applications: A Feasibility Study," Farella et al., 2006.
"Laser magnetometry in fundamental science and in biomagnetic applications," Weis et al., 2005.
"MagiTact: Interaction with Mobile Devices Based on Compass(Magnetic) Sensor," Ketabdar et al., ACM Feb. 1-10, 2010.
"Proximity-based authentication of mobile devices," Scannell et al., Intl J. Security and Networks, vol. 4, No. 1/2, 2009.
Bimodal Biometric Person Authentication System Using Speech and Signature Features. Eshwarappa et al. IJBB (2005).
Biometric Identity Verification Using Intra-Body Propagation Signal. Nakanishi et al. IEEE (2007).
Jackson Research, Balanced High Security Magnetometer, http://www.jrmagnetics.com/security/jr2222/jr2222.php, Copyright 1999-2014.
MagiSign: User Identification/Authentication. Ketabdar et al. 2010.
Mind How You Answer Me!. Conti et al. ASIACCS. (Year: 2011).*
System and method to use gestures for group selection, membership and authentication. IBM. IP.com, Mar. 10, 2009.
U.S. Notice of Allowance dated Dec. 29, 2016 in U.S. Appl. No. 15/078,317.
U.S. Notice of Allowance dated Feb. 3, 2017 in U.S. Appl. No. 14/948,567.
U.S. Notice of Allowance dated Jan. 13, 2016 in U.S. Appl. No. 14/261,660.
U.S. Notice of Allowance dated Jan. 14, 2014 in U.S. Appl. No. 11/699,227.
U.S. Notice of Allowance dated Jan. 22, 2014 in U.S. Appl. No. 13/180,805.
U.S. Notice of Allowance dated Jul. 20, 2015 in U.S. Appl. No. 14/299,400.
U.S. Notice of Allowance dated May 12, 2016 in U.S. Appl. No. 14/261,660.
U.S. Notice of Allowance dated May 22, 2017 in U.S. Appl. No. 14/948,567.
U.S. Office Action dated Aug. 15, 2013 in U.S. Appl. No. 11/699,227.
U.S. Office Action dated Mar. 18, 2015 in U.S. Appl. No. 14/299,400.
U.S. Office Action dated Mar. 23, 2012 in U.S. Appl. No. 11/699,227.
U.S. Office Action dated May 12, 2010 in U.S. Appl. No. 11/699,227.
U.S. Office Action dated May 7, 2013 in U.S. Appl. No. 13/180,805.
U.S. Office Action dated Nov. 27, 2012 in U.S. Appl. No. 13/180,805.
U.S. Office Action dated Nov. 9, 2010 in U.S. Appl. No. 11/699,227.
U.S. Office Action dated Oct. 2, 2012 in U.S. Appl. No. 11/699,227.
U.S. Office Action dated Sep. 18, 2013 in U.S. Appl. No. 13/180,805.
U.S. Office Action dated Sep. 26, 2016 in U.S. Appl. No. 14/948,567.
User-Defined Gestures for Connecting Mobile Phones, Public Display, and Tabletops. Kray et al. Mobile HCI (2010).

Also Published As

Publication numberPublication date
US9197636B2 (en)2015-11-24
US20160087979A1 (en)2016-03-24
US20140289835A1 (en)2014-09-25
US20130019292A1 (en)2013-01-17
US9769165B2 (en)2017-09-19
US8752200B2 (en)2014-06-10
US20180007044A1 (en)2018-01-04

Similar Documents

PublicationPublication DateTitle
US10523670B2 (en)Devices, systems, and methods for security using magnetic field based identification
US9443071B2 (en)Proximity based device security
US9183683B2 (en)Method and system for access to secure resources
US20130007876A1 (en)System and method of providing biometric quick launch
US9224029B2 (en)Electronic device switchable to a user-interface unlocked mode based upon a pattern of input motions and related methods
US20150172927A1 (en)Mobile Device Authentication
US9824203B2 (en)Utilizing a radio frequency identification tag to assess the battery level of a peripheral device
US20070280515A1 (en)Portable electronic apparatus and recording medium
US20120127179A1 (en)Method, apparatus and computer program product for user interface
KR20150046766A (en)Unlocking process mehtod, apparatus and device for terminal
EP3122018B1 (en)Mobile terminal and method of controlling the same
WO2018086259A1 (en)Authentication method and electronic device
JP4709065B2 (en) Portable terminal device with fingerprint authentication function and program
EP3082326A1 (en)Utilizing a radio frequency identification tag to control one or more operational states of a peripheral device
EP2634719B1 (en)System and method of providing biometric quick launch
US9805183B2 (en)Utilizing radio frequency identification tags to display messages and notifications on peripheral devices
CN108549804A (en)Mode switching method and device, computer readable storage medium, terminal
US20140181958A1 (en)Secure and convenient authentication
CN110889101A (en) Terminal function control method, device and readable storage medium
JP2015074923A (en) Mobile device
WO2014038430A1 (en)Portable terminal, and method and program for controlling portable terminal
JP5082531B2 (en) Mobile communication terminal and program
KR20050086140A (en)Method for locking door by biometric information in mobile phone
JP2006174090A (en) Mobile communication terminal

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:AT&T INTELLECTUAL PROPERTY I, L.P., GEORGIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VARSHAVSKY, ALEXANDER;LI, KEVIN ANSIA;SIGNING DATES FROM 20110623 TO 20110711;REEL/FRAME:043883/0520

FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

STCFInformation on status: patent grant

Free format text:PATENTED CASE

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPSLapse for failure to pay maintenance fees

Free format text:PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20231231


[8]ページ先頭

©2009-2025 Movatter.jp